[8104] in cryptography@c2.net mail archive
Re: Key-Address correspondence in networks?
daemon@ATHENA.MIT.EDU (Bram Cohen)
Sun Nov 19 19:03:24 2000
Date: Sun, 19 Nov 2000 15:41:05 -0800 (PST)
From: Bram Cohen <bram@gawth.com>
To: Ray Dillinger <bear@sonic.net>
Cc: cryptography@c2.net, cypherpunks@algebra.com
In-Reply-To: <Pine.LNX.4.21.0011191046240.7899-100000@bolt.sonic.net>
Message-ID: <Pine.LNX.4.21.0011191539120.2406-100000@ultra.gawth.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
On Sun, 19 Nov 2000, Ray Dillinger wrote:
> Bluntly, after reviewing PKI and x.509 certs, I don't think that
> there is a sufficient reason to trust that the machine I'm talking
> to is actually the machine its cert claims it to be.
Like I said, the important thing is that it stops passive attacks - in
practice man in the middle attacks just don't seem to happen.
-Bram Cohen